SlideShare a Scribd company logo
1 of 17
Download to read offline
Logging safely in public spaces
using attribute PINs
Frank Nielsen
Frank.Nielsen@acm.org
5793b870
Sony Computer Science Laboratories, Inc.

2013

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

1/17
Logging, the need for a secure UI...

We daily use...
◮

more and more cloud services...

◮

Internet terminals in public spaces...

→ threats of passwords being stolen (yielding identity theft!).
Many potential threats:
◮

shoulder-surfing attacks

◮

concealed spy cameras (video surveillance)

◮

spyware (key and mouse loggers)

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

2/17
Tokens, biometrics and secure UI...

Current mainstream solution:
◮

One Time passwords (OTPs), physical token (can be stolen
or borrowed too!), or

◮

biometrics (expensive)+PINs

Our proposal: Design a secure UI with zero-knowledge using
associative PINs: A UI PIN associated to a USR PIN (both secret).
→ robust by design to mouse loggers and video captures.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

3/17
Associative PINs
Concept = Two graphics keyboards:
◮

Fixed digit board (or letters, icons, etc.)

◮

Moveable cursor letter board (or digits, icons, etc.)

Task (Human): Align the cursor to the corresponding digit
◮

Origin is chosen at random (keylogger cannot replay mouse
motions).

◮

Torus topology for wrapping the moveable cursor board.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

4/17
Example (shuffling the fixed digit board after each input)

3141
CAHB

3141
CAHB

3141
CAHB

3141
CAHB

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

5/17
2 × 5 keyboard layout

◮

Implemented in Processing, processing.org

◮

Wrapping the cursor operating system on the screen edges
(for endless smooth toric motion) using JavaTM Robot class

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

6/17
Torus topology/mouse origin

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

7/17
Some extensions of the basic AssociativePIN system

◮

Use legacy password systems (split in half the password into
PASSWD and USR-PASSWD parts),

◮

Graphics board skins,

◮

Cursor control using another device,

◮

Free users from remembering another UI PASSWD: Generate
One-time UI PASSWDS from user profiles.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

8/17
Graphics skins: Colors/Icons on fixed Digits

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

9/17
Generating UI passwords from user profiles
To help user memorize the UI password and generate many UI
passwords, we define a user profile by asking a set of k questions,
each with n choices like what is her favorite food, favorite place,
favorite color, favorite celebrity, favorite movie, favorite music, etc.
Each time the user enters a key, the moveable cursor skin changes
to the next mode: food→place→color→celebrity→movie→music,
...
Furthermore, for k-length passwords, we generate a random
permutation on the question orders (yielding k! UI passwords)
However less secure when observers know or guess his/her
preferences.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

10/17
Prior work (I)
◮

CursorCamouflage [11]: set of dummy cursors that makes it
difficult for observers to correlate with the user hand motion.

◮

Convex Hull Pass Icons [12]: enter password with pass-icons
blended with other icons on a 2D layout; The user is required
to pass several challenges where each challenge asks to click
inside the convex hull of the pass icons.

◮

Cognitive Trapdoor Games [8]: select on which set the current
PIN code digit is contained. After a few selections, the system
knows by “intersecting” the challenge subsets which digit was
entered, and proceed for entering the next digit, etc.

◮

FakeCursor [9]: The FakeCursor system manages a fixed
secret and a disposal secret: enter pin code by aligning the
secret digit on the fixed disposal icons using left/right
ATM-like arrow buttons. We can interpret FakeCursor as a
discrete UI working on the 1D ring topology.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

11/17
Prior work (II)

◮

ColorPin [3]: PIN entry system using color PINs relying on
keyboard interactions. At the bottom of each digit, three
colored letters (black, red and white) are shown. Each letter
appears in all three different colors for security reasons. The
user enters the color PIN by pressing corresponding keyboard
keys.

◮

Login systems designed based on eye gaze input [6]

◮

PIN Tactons [7]. Well-suited for visually impaired people.

◮

etc.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

12/17
Potential security threats

◮

UI PASSWORD too simple

◮

gaze tracking and advanced computer vision: guess which
part were “intentionally” aligned by observing the user’ eyes.
→ risk minimized by showing a small board size.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

13/17
Videos/Software

http://www.sonycsl.co.jp/person/nielsen/ColorPINs/
http://www.youtube.com/watch?v=IDgaH-ilUCw
@article{ColorPINS,
author
= {Frank Nielsen},
title
= {Logging safely in public spaces using color PINs},
journal
= {CoRR},
volume
= {abs/1304.6499},
year
= {2013},
ee
= {http://arxiv.org/abs/1304.6499}
}

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

14/17
Bibliographic references I
William Cheswick.
Rethinking passwords.
Commun. ACM, 56(2):40–44, February 2013.
John Chuang, Hamilton Nguyen, Charles Wang, and Benjamin Johnson.
I think, therefore i am: Usability and security of authentication using brainwaves.
In Proceedings of the Workshop on Usable Security, USEC ’13, 2013.
Alexander De Luca, Katja Hertzschuch, and Heinrich Hussmann.
Colorpin: securing pin entry through indirect input.
In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pages
1103–1106, New York, NY, USA, 2010. ACM.
Yutaka Hirakawa, Motohiro Take, and Kazuo Ohzeki.
Pass-image authentication method tolerant to random and video-recording attacks.
International Journal of Computer Science & Applications (IJCSA), 9(3):20–36, 2012.
B. Kaliski.
Pkcs #5: Password-based cryptography specification version 2.0 (rfc), 2000.
Manu Kumar, Tal Garfinkel, Dan Boneh, and Terry Winograd.
Reducing shoulder-surfing by using gaze-based password entry.
In Proceedings of the 3rd symposium on Usable privacy and security, SOUPS ’07, pages 13–19, New York,
NY, USA, 2007. ACM.
c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

15/17
Bibliographic references II
Xuˆn-Linh Labb´.
a
e
Touchscreen accessibility - accessible and secure authentication using a haptic PIN.
Master’s thesis, University of Glasgow, 2010.
Volker Roth, Kai Richter, and Rene Freidinger.
A PIN-entry method resilient against shoulder surfing.
In Proceedings of the 11th ACM conference on Computer and communications security, CCS ’04, pages
236–245, New York, NY, USA, 2004. ACM.
Tetsuji Takada.
Fakepointer: An authentication scheme for improving security against peeping attacks using video cameras.
In Proceedings of the 2 Second International Conference on Mobile Ubiquitous Computing, Systems,
Services and Technologies, UBICOMM ’08, pages 395–400, Washington, DC, USA, 2008. IEEE Computer
Society.
Tetsuji Takada.
Fakepointer: An authentication scheme for improving security against peeping attacks using video cameras.
In Proceedings of the 2008 The Second International Conference on Mobile Ubiquitous Computing,
Systems, Services and Technologies, UBICOMM ’08, pages 395–400, Washington, DC, USA, 2008. IEEE
Computer Society.
Keita Watanabe, Fumito Higuchi, Masahiko Inami, and Takeo Igarashi.
CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing.
In SIGGRAPH Asia 2012 Emerging Technologies, SA ’12, pages 6:1–6:2, New York, NY, USA, 2012. ACM.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

16/17
Bibliographic references III

Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, and Jean-Camille Birget.
Design and evaluation of a shoulder-surfing resistant graphical password scheme.
In Proceedings of the working conference on Advanced visual interfaces, AVI ’06, pages 177–184, New York,
NY, USA, 2006. ACM.

c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc.

17/17

More Related Content

Viewers also liked

Inteligencia Artificial
Inteligencia ArtificialInteligencia Artificial
Inteligencia Artificial
omarjmv
 
Mechanical design – ii (mee 303) rcs (makeup)
Mechanical design – ii (mee  303) rcs (makeup)Mechanical design – ii (mee  303) rcs (makeup)
Mechanical design – ii (mee 303) rcs (makeup)
Prasoon Ranjan
 
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
Khemjira_P
 
Commodity daily-technical-report-09-december
Commodity daily-technical-report-09-decemberCommodity daily-technical-report-09-december
Commodity daily-technical-report-09-december
trifid research
 
спосіб округлення. математика 4 клас
спосіб округлення. математика 4 класспосіб округлення. математика 4 клас
спосіб округлення. математика 4 клас
Жанна Коваль
 
Linkedin recruitment | A view tips...
Linkedin recruitment | A view tips...Linkedin recruitment | A view tips...
Linkedin recruitment | A view tips...
Sander Bredewout
 
โครงงานคอมพิวเตอร์
โครงงานคอมพิวเตอร์โครงงานคอมพิวเตอร์
โครงงานคอมพิวเตอร์
Khemjira_P
 
thinkBIM 2013 pecha kucha
thinkBIM 2013 pecha kuchathinkBIM 2013 pecha kucha
thinkBIM 2013 pecha kucha
Campus
 

Viewers also liked (20)

Investment management
Investment managementInvestment management
Investment management
 
Blackberry (1)
Blackberry (1)Blackberry (1)
Blackberry (1)
 
Inteligencia Artificial
Inteligencia ArtificialInteligencia Artificial
Inteligencia Artificial
 
Blackberry (4)
Blackberry (4)Blackberry (4)
Blackberry (4)
 
Fitness
FitnessFitness
Fitness
 
Blackberry (2)
Blackberry (2)Blackberry (2)
Blackberry (2)
 
Blackberry (3)
Blackberry (3)Blackberry (3)
Blackberry (3)
 
Kurumsallaşma eğitimi
Kurumsallaşma eğitimiKurumsallaşma eğitimi
Kurumsallaşma eğitimi
 
Mechanical design – ii (mee 303) rcs (makeup)
Mechanical design – ii (mee  303) rcs (makeup)Mechanical design – ii (mee  303) rcs (makeup)
Mechanical design – ii (mee 303) rcs (makeup)
 
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
ใบงาน เรื่อง ประโยชน์ของโครงงานคอมพิวเตอร์
 
Commodity daily-technical-report-09-december
Commodity daily-technical-report-09-decemberCommodity daily-technical-report-09-december
Commodity daily-technical-report-09-december
 
separaciones
separacionesseparaciones
separaciones
 
спосіб округлення. математика 4 клас
спосіб округлення. математика 4 класспосіб округлення. математика 4 клас
спосіб округлення. математика 4 клас
 
Linkedin recruitment | A view tips...
Linkedin recruitment | A view tips...Linkedin recruitment | A view tips...
Linkedin recruitment | A view tips...
 
โครงงานคอมพิวเตอร์
โครงงานคอมพิวเตอร์โครงงานคอมพิวเตอร์
โครงงานคอมพิวเตอร์
 
thinkBIM 2013 pecha kucha
thinkBIM 2013 pecha kuchathinkBIM 2013 pecha kucha
thinkBIM 2013 pecha kucha
 
IGL Relocation - Brochure
IGL Relocation - BrochureIGL Relocation - Brochure
IGL Relocation - Brochure
 
Bangalore brochure design company
Bangalore brochure design companyBangalore brochure design company
Bangalore brochure design company
 
Evolución de la filosofía social
Evolución de la filosofía socialEvolución de la filosofía social
Evolución de la filosofía social
 
ITBMS Profile
ITBMS ProfileITBMS Profile
ITBMS Profile
 

Similar to Slides: Logging safely in public spaces using color PINs

ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
ITCamp
 
PPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh SidhuPPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh Sidhu
jagdeepsidhu
 
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
ITCamp
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
sunil kumar
 

Similar to Slides: Logging safely in public spaces using color PINs (20)

sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.
sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.
sixth sense technology 2014 ,by Richard Des Nieves,Bengaluru,kar,India.
 
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...
 
PPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh SidhuPPT of 6th sense tech. Jagdeep Singh Sidhu
PPT of 6th sense tech. Jagdeep Singh Sidhu
 
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyEmerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
 
5 pen pc technology by divya
5 pen pc technology by divya5 pen pc technology by divya
5 pen pc technology by divya
 
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
ITCamp 2013 - Tim Huckaby - Kinect for Windows - Designing Software for Gestu...
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
 
Sixth sense technology PPT
Sixth sense technology PPTSixth sense technology PPT
Sixth sense technology PPT
 
5 Pen Pc Technology
5 Pen Pc Technology5 Pen Pc Technology
5 Pen Pc Technology
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
L2 cs110 jcu-sindonirev04092011
L2 cs110 jcu-sindonirev04092011L2 cs110 jcu-sindonirev04092011
L2 cs110 jcu-sindonirev04092011
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
Six Sense Technology
Six Sense TechnologySix Sense Technology
Six Sense Technology
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
sixth sense technology.pdf
sixth sense technology.pdfsixth sense technology.pdf
sixth sense technology.pdf
 
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)
 
Sixth sense by kuntal ppt
Sixth sense by kuntal pptSixth sense by kuntal ppt
Sixth sense by kuntal ppt
 
Sixth sense
Sixth senseSixth sense
Sixth sense
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Slides: Logging safely in public spaces using color PINs

  • 1. Logging safely in public spaces using attribute PINs Frank Nielsen Frank.Nielsen@acm.org 5793b870 Sony Computer Science Laboratories, Inc. 2013 c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 1/17
  • 2. Logging, the need for a secure UI... We daily use... ◮ more and more cloud services... ◮ Internet terminals in public spaces... → threats of passwords being stolen (yielding identity theft!). Many potential threats: ◮ shoulder-surfing attacks ◮ concealed spy cameras (video surveillance) ◮ spyware (key and mouse loggers) c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 2/17
  • 3. Tokens, biometrics and secure UI... Current mainstream solution: ◮ One Time passwords (OTPs), physical token (can be stolen or borrowed too!), or ◮ biometrics (expensive)+PINs Our proposal: Design a secure UI with zero-knowledge using associative PINs: A UI PIN associated to a USR PIN (both secret). → robust by design to mouse loggers and video captures. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 3/17
  • 4. Associative PINs Concept = Two graphics keyboards: ◮ Fixed digit board (or letters, icons, etc.) ◮ Moveable cursor letter board (or digits, icons, etc.) Task (Human): Align the cursor to the corresponding digit ◮ Origin is chosen at random (keylogger cannot replay mouse motions). ◮ Torus topology for wrapping the moveable cursor board. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 4/17
  • 5. Example (shuffling the fixed digit board after each input) 3141 CAHB 3141 CAHB 3141 CAHB 3141 CAHB c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 5/17
  • 6. 2 × 5 keyboard layout ◮ Implemented in Processing, processing.org ◮ Wrapping the cursor operating system on the screen edges (for endless smooth toric motion) using JavaTM Robot class c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 6/17
  • 7. Torus topology/mouse origin c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 7/17
  • 8. Some extensions of the basic AssociativePIN system ◮ Use legacy password systems (split in half the password into PASSWD and USR-PASSWD parts), ◮ Graphics board skins, ◮ Cursor control using another device, ◮ Free users from remembering another UI PASSWD: Generate One-time UI PASSWDS from user profiles. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 8/17
  • 9. Graphics skins: Colors/Icons on fixed Digits c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 9/17
  • 10. Generating UI passwords from user profiles To help user memorize the UI password and generate many UI passwords, we define a user profile by asking a set of k questions, each with n choices like what is her favorite food, favorite place, favorite color, favorite celebrity, favorite movie, favorite music, etc. Each time the user enters a key, the moveable cursor skin changes to the next mode: food→place→color→celebrity→movie→music, ... Furthermore, for k-length passwords, we generate a random permutation on the question orders (yielding k! UI passwords) However less secure when observers know or guess his/her preferences. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 10/17
  • 11. Prior work (I) ◮ CursorCamouflage [11]: set of dummy cursors that makes it difficult for observers to correlate with the user hand motion. ◮ Convex Hull Pass Icons [12]: enter password with pass-icons blended with other icons on a 2D layout; The user is required to pass several challenges where each challenge asks to click inside the convex hull of the pass icons. ◮ Cognitive Trapdoor Games [8]: select on which set the current PIN code digit is contained. After a few selections, the system knows by “intersecting” the challenge subsets which digit was entered, and proceed for entering the next digit, etc. ◮ FakeCursor [9]: The FakeCursor system manages a fixed secret and a disposal secret: enter pin code by aligning the secret digit on the fixed disposal icons using left/right ATM-like arrow buttons. We can interpret FakeCursor as a discrete UI working on the 1D ring topology. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 11/17
  • 12. Prior work (II) ◮ ColorPin [3]: PIN entry system using color PINs relying on keyboard interactions. At the bottom of each digit, three colored letters (black, red and white) are shown. Each letter appears in all three different colors for security reasons. The user enters the color PIN by pressing corresponding keyboard keys. ◮ Login systems designed based on eye gaze input [6] ◮ PIN Tactons [7]. Well-suited for visually impaired people. ◮ etc. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 12/17
  • 13. Potential security threats ◮ UI PASSWORD too simple ◮ gaze tracking and advanced computer vision: guess which part were “intentionally” aligned by observing the user’ eyes. → risk minimized by showing a small board size. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 13/17
  • 14. Videos/Software http://www.sonycsl.co.jp/person/nielsen/ColorPINs/ http://www.youtube.com/watch?v=IDgaH-ilUCw @article{ColorPINS, author = {Frank Nielsen}, title = {Logging safely in public spaces using color PINs}, journal = {CoRR}, volume = {abs/1304.6499}, year = {2013}, ee = {http://arxiv.org/abs/1304.6499} } c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 14/17
  • 15. Bibliographic references I William Cheswick. Rethinking passwords. Commun. ACM, 56(2):40–44, February 2013. John Chuang, Hamilton Nguyen, Charles Wang, and Benjamin Johnson. I think, therefore i am: Usability and security of authentication using brainwaves. In Proceedings of the Workshop on Usable Security, USEC ’13, 2013. Alexander De Luca, Katja Hertzschuch, and Heinrich Hussmann. Colorpin: securing pin entry through indirect input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pages 1103–1106, New York, NY, USA, 2010. ACM. Yutaka Hirakawa, Motohiro Take, and Kazuo Ohzeki. Pass-image authentication method tolerant to random and video-recording attacks. International Journal of Computer Science & Applications (IJCSA), 9(3):20–36, 2012. B. Kaliski. Pkcs #5: Password-based cryptography specification version 2.0 (rfc), 2000. Manu Kumar, Tal Garfinkel, Dan Boneh, and Terry Winograd. Reducing shoulder-surfing by using gaze-based password entry. In Proceedings of the 3rd symposium on Usable privacy and security, SOUPS ’07, pages 13–19, New York, NY, USA, 2007. ACM. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 15/17
  • 16. Bibliographic references II Xuˆn-Linh Labb´. a e Touchscreen accessibility - accessible and secure authentication using a haptic PIN. Master’s thesis, University of Glasgow, 2010. Volker Roth, Kai Richter, and Rene Freidinger. A PIN-entry method resilient against shoulder surfing. In Proceedings of the 11th ACM conference on Computer and communications security, CCS ’04, pages 236–245, New York, NY, USA, 2004. ACM. Tetsuji Takada. Fakepointer: An authentication scheme for improving security against peeping attacks using video cameras. In Proceedings of the 2 Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM ’08, pages 395–400, Washington, DC, USA, 2008. IEEE Computer Society. Tetsuji Takada. Fakepointer: An authentication scheme for improving security against peeping attacks using video cameras. In Proceedings of the 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM ’08, pages 395–400, Washington, DC, USA, 2008. IEEE Computer Society. Keita Watanabe, Fumito Higuchi, Masahiko Inami, and Takeo Igarashi. CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing. In SIGGRAPH Asia 2012 Emerging Technologies, SA ’12, pages 6:1–6:2, New York, NY, USA, 2012. ACM. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 16/17
  • 17. Bibliographic references III Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, and Jean-Camille Birget. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proceedings of the working conference on Advanced visual interfaces, AVI ’06, pages 177–184, New York, NY, USA, 2006. ACM. c 2013 Frank Nielsen, Sony Computer Science Laboratories, Inc. 17/17